The Absolute Beginners Guide To Information Cyber Security

Learn Cyber Security concepts such as hacking, malware, firewalls, worms, phishing, encryption, biometrics, BYOD & more

Last updated 2022-01-10 | 4.6

- Understand the basic concepts and terminologies used in the information and cyber security fields
- Take up entry roles for IT and Cybersecurity Positions
- Differentiate between the various forms of malware and how they affect computers and networks

What you'll learn

Understand the basic concepts and terminologies used in the information and cyber security fields
Take up entry roles for IT and Cybersecurity Positions
Differentiate between the various forms of malware and how they affect computers and networks
Understand how hackers actually hack

* Requirements

* You should know how to use a computer
* You should know how to use the internet

Description

** PART 1 OF THE CYBER SECURITY GUIDE FOR BEGINNERS SERIES **

** UPDATED AUGUST 2021 WITH NEW LESSON ON RANSOMWARE **

Have you ever wondered exactly how hackers 'hack'? Do words like firewalls, encryption, bio-metrics and malware sound confusing to you? Have you been looking for a course that teaches you all the basics of both information and cyber security in a fun relaxed manner? If so then you are going to find this course absolutely perfect for you.

This is a course that is perfect as an introductory one for individuals and students who are interested in becoming cyber security or information security professionals. It is also ideal for students who just want to have a well rounded knowledge about the basic concepts used in the world of information security.

Over 40000 happy students have enrolled in this best seller course which has an average rating of 4.6 due to stellar reviews.

'An expert with great teaching style: provided clear explanations and concise definitions. Topics were reinforced and made tangible using graphics and real life (or movie) examples. The quizzes helped me retain and feel confident about the material.'  - E. Wolfe

"Great intro to Cyber Security. I currently work in IT and I'm considering transitioning to InfoSec. This course was very informative and it has me motivated to continue exploring and learning more about the field of Cyber Security and InfoSec. I am even going to recommend this to my wife who works in IT management as it would be very useful in helping her understand the different concepts. The instructor is good. Speaks clearly and provides good examples." - Chris Loyola

PERFECT FOR COMPLETE BEGINNERS

This course is intended primarily for students who have little to no prior background or knowledge about the field of cyber security. 

Course Curriculum

In the very first section, we will cover the basic terminologies used and discuss topics like the trinity of IT security and computer protocols.

In section 2, we will explore the world of hackers and the hacking methodology. We will take a look at the different types of hackers and how they actually hack.

Section 3 will introduce you to the various ways how cyber criminals and hackers attack systems and networks. You will learn about the most popular forms of attacks such as 

  • Phishing

  • Brute Force Attack

  • DoS & DDoS Attacks

  • Bots and Botnets

  • and much more

We will then move on to cover everything about malware. You will learn the various forms of malware such as viruses, worms and trojans and how they differ from one another.

In section 4, you will learn about the methods employed by cyber security professionals to protect systems and networks from cyber attacks. You will learn how the following work

  • Antivirus

  • Firewalls

  • Encryption

  • Biometrics

  • Authentication Methods

  • and much more

Finally we will cover and discuss about other topics related to both information and cyber security such as the BYOD policy and cyber warfare.

By the end of this course, you would have gained a lot of knowledge and insights that can help to jump start your career as an information security professional. 

What are you waiting for??? Enroll in this best selling course today.

Alex.

Who this course is for:

  • Students who want to learn the basics of computer and cyber security
  • Students who want to become IT or Cyber Security Experts

Course content

8 sections • 63 lectures

Welcome to the Course Preview 03:31

Connect with Me Preview 03:46

Udemy Rating System - Very Important !!! Preview 01:24

Download the Guide Book Preview 00:03

Difference Between Information Security and Cyber Security Preview 02:37

The Trinity of IT Security - CIA Preview 03:11

Basic Terminologies Preview 01:10

Computer Protocols Preview 07:04

Cookies Preview 00:32

The TCP/IP Preview 03:32

Section Quiz

Section Intro Preview 00:57

What is NOT Hacking Preview 04:26

Types of Hackers Preview 07:18

The Hacking Methodology Preview 05:46

The WhoIS Query Preview 05:39

Social Engineering Preview 03:36

Section Quiz

Intro to the Section Preview 00:49

Brute Force Attacks Preview 04:17

Phishing Preview 05:14

Phishing - Part 2 Preview 06:04

Phishing - Part 3 Preview 10:18

Bots and Botnets Preview 03:27

DoS and DDoS Preview 04:44

Pings Preview 03:25

Man in the Middle Attacks Preview 04:18

SQL Injections Preview 05:01

Section Quiz

Introduction to Malware Preview 01:03

Viruses & Worms Preview 04:51

Trojans Preview 07:19

Adware and Spyware Preview 03:59

Ransomware Preview 06:32

Other Types of Malware Preview 03:38

Section Quiz

Section Intro Preview 00:42

Anti Virus Preview 04:34

Encryption Preview 03:07

Firewalls Preview 04:13

Biometrics Preview 03:14

Factor Authentication Methods Preview 04:54

Honey Pots and DMZs Preview 05:07

Security for Wireless Networks Preview 02:08

Password Management Preview 10:38

Section Quiz

Cyber Security Policies Preview 03:47

BYOD Management Preview 03:06

A Sample BYOD Policy Preview 06:15

The Security vs Ease of Access Paradox Preview 03:07

The Weakest Link & The Disgruntled Employee Preview 02:02

Review Update Preview 02:42

Introduction to Cyber Warfare Preview 02:25

The Attack Against Estonia Preview 06:30

Stuxnet and the Attack Against Iran Preview 04:30

The Colonial Pipeline Attack Preview 04:35

The Sony Hack Preview 03:31

Course Promo Preview 05:07

Actionable Steps for Personal Security Preview 01:36

Biggest Myths of Online Security Preview 07:01

SPECIAL LESSON - How to Launch your Career in Cyber Security Preview 08:36

Getting your Certificate Preview 03:00

Conclusion Preview 01:48